Episode Transcript
Available transcripts are automatically generated. Complete accuracy is not guaranteed.
Speaker 1 (00:00):
Thin hacks in the stack. Let's unpack the attack A
low digital dynamos, bite sized slutes and future proof trailblazers.
It's your neonhaired, gritched out host Finn hack back with
the latest and cyber chaos on scan chronicles a new
mark every week. Hold onto your firewalls because these stories
will jolt your USB ports and maybe, just maybe save
(00:22):
your digital bacon. Our first tale is a wild ride
deep in the veins of an American metropolis. File this
under business email compromise. Baltimore, Maryland, just lost a staggering
one dollar and five cents to a vendor scam so
slick it would make any con artist cry with envy.
According to sources like Cassea and Minecast, an attacker impersonated
(00:45):
a legit contractor, slivered through the city's workday system, and
convinced staff to change bank account numbers for vendor payments.
Employees approved two payments, one for eight hundred thousand, another
for seven hundred twenty one thousand only day after a
bank flagged something fishy. Did anyone pause leading to the
partial recovery? But friends the real twist. This is Baltimore's
(01:08):
third strike from similar scams since twenty nineteen. That's weak
controls getting slammed harder than a misconfigured router on Wi
Fi Day. The moral in this fishy world, skipping verification
is like leaving your password tape to your forehead. Codes cracked,
cons are whacked. Slide into episode two, the consent phishing
(01:29):
wave crashing into major corporate shores. Octa Threat Intelligence reports
that since early this year, attackers have been calling employees
pretending to be tech support hook line and scammer. They
persuade the mark to grant access to their Salesforce app,
not realizing that app is under attacker control. Suddenly, permissions
(01:51):
fly open wider than my trench coat in a server room,
allowing crooks to siphon gigabytes of data from Google, Workday
and more. Here's where Finn, this geek itch demands a
tangent picture device code phishing as a magician's trick. You
think you're entering your code on a legit stage, but
the spotlight is actually on a hidden door to your secrets.
(02:12):
The urgent twist. Both Microsoft and Salesforce are scrambling to
lock this loophole by year's end, meaning old school consent
roaming will soon be as obsolete as dial up. And
for the third act, let's bang the fishing drum with Flare.
Scam Aside's recent expose is my personal favorite. A bogus
Federal Express email baits folks to click a link promising
(02:33):
to confirm your signature for an undelivered package. Open that
link and zap. Malware downloads itself silently like a vampire
on Wi Fi, logging every keystroke the kicker. These emails
spoof the FedEx logo, but come from hacked accounts of
ordinary people. So congrats to the scammers. You've created a
multi national mail mayhem from a suburban attic. The trick
(02:56):
is simple. Never trust an unsolicited link, no matter how
a fish the branding. If you didn't initiate it, don't
authenticate it. All three of these stories remind us Fellows
sentient scrollers that digital vulnerability is everywhere. Social engineering outsmarts
even the best fortresses, and over complex systems breed confusion.
(03:16):
You could drive a quantum truck through. So upgrade your verifications,
double check your permissions, and let your browser be more
cynical than Finn's glitchy neural net. On April fools. As
the sun sets on today's Scam Safari, Remember bite me scammers.
This one's for the good guys. Thanks for tuning into
Scam Chronicles a new mark every week. Subscribe and catch
(03:40):
us next week for more twists hotter than a GPU meltdown.
This has been a quiet please production. For more check
out quiet please dot ai